Hier werden die Unterschiede zwischen zwei Versionen angezeigt.
Beide Seiten der vorigen RevisionVorhergehende ÜberarbeitungNächste Überarbeitung | Vorhergehende Überarbeitung | ||
project:27c3_videos [30.12.2010 17:09] – backtick | project:27c3_videos [14.01.2013 15:56] (aktuell) – Externe Bearbeitung 127.0.0.1 | ||
---|---|---|---|
Zeile 1: | Zeile 1: | ||
Plan: " | Plan: " | ||
- | TODO: Abstimmungsmodus ausdenken | + | * Vorschlag: Wir schauen ein Paar Mal Samstags bevor die Open HackNight losgeht je einen Vortrag. Ich glaube sonst finden wir eh keinen vernünftigen Termin. Alternativ geht auch, Vortrag beim Seminartreffen ausfallen lassen, |
- | Idee dafür: Jeder macht ein Plus (oder besser, irgendein Tag, damit man das auch wiederfindet wenn man seinen Vote ändern will) hinter | + | * Ich hab jetzt alle durchnummeriert - nun kann jeder die Nummern der Vorträge |
- | -- jeder vortrag | + | * Nähere Infos zu den einzelnen Vorträgen unter https:// |
+ | |||
+ | * Btw, ich weiß nicht ob es möglich ist, wirklich von allen hier aufgelisteten Veranstaltungen Videomitschnitte zu kriegen. Aber mal schauen was geht ;) | ||
+ | |||
+ | * Mit Diskussionsveranstaltung danach? So damit die Gäste nicht nur Konsumenten sind. --- contradictioned | ||
+ | * halte ich für eine gute Idee --- eB | ||
====== Liste der Vorträge ====== | ====== Liste der Vorträge ====== | ||
- | *27C3 Keynote | + | * 1. - 27C3 Keynote |
- | *Abschlussveranstaltung | + | * 2. - Abschlussveranstaltung |
- | *A Critical Overview of 10 years of Privacy Enhancing Technologies | + | * 3. - A Critical Overview of 10 years of Privacy Enhancing Technologies |
- | *Adventures in analyzing Stuxnet | + | * 4. - Adventures in analyzing Stuxnet |
- | *Adventures in Mapping Afghanistan Elections | + | * 5. - Adventures in Mapping Afghanistan Elections |
- | *The story of 3 Ushahidi mapping and reporting projects. | + | * 6. - The story of 3 Ushahidi mapping and reporting projects. |
- | *A framework for automated architecture-independent gadget search | + | * 7. - A framework for automated architecture-independent gadget search |
- | *AllColoursAreBeautiful | + | * 8. - All Colours Are Beautiful |
- | *Analyzing a modern cryptographic RFID system | + | * 9. - Analyzing a modern cryptographic RFID system |
- | *Android geolocation using GSM network | + | * 10. - Android geolocation using GSM network |
- | *A short political history of acoustics | + | * 11. - A short political history of acoustics |
- | *Automatic Identification of Cryptographic Primitives in Software | + | * 12. - Automatic Identification of Cryptographic Primitives in Software |
- | *Building Custom Disassemblers | + | * 13. - Building Custom Disassemblers |
- | *CCC-Jahresr&# | + | * 14. - CCC-Jahresrückblick |
- | *Chip and PIN is Broken | + | * 15. - Chip and PIN is Broken |
- | *Code deobfuscation by optimization | + | * 16. - Code deobfuscation by optimization |
- | *Cognitive Psychology for Hackers | + | * 17. - Cognitive Psychology for Hackers |
- | *Console Hacking 2010 | + | * 18. - Console Hacking 2010 |
- | *Contemporary Profiling of Web Users | + | * 19. - Contemporary Profiling of Web Users |
- | *Copyright Enforcement Vs. Freedoms | + | * 20. - Copyright Enforcement Vs. Freedoms |
- | *Cybernetics for the Masses | + | * 21. - Cybernetics for the Masses |
- | *Data Analysis in Terabit Ethernet Traffic | + | * 22. - Data Analysis in Terabit Ethernet Traffic |
- | *Data Recovery Techniques | + | * 23. - Data Recovery Techniques |
- | *Data Retention in the EU five years after the Directive | + | * 24. - Data Retention in the EU five years after the Directive |
- | *Defense is not dead | + | * 25. - Defense is not dead |
- | *Desktop on the Linux... (and BSD, of course) | + | * 26. - Desktop on the Linux... (and BSD, of course) |
- | *"Die gesamte Technik ist sicher" | + | * 27. - "Die gesamte Technik ist sicher" |
- | *Digitale Spaltung per Gesetz | + | * 28. - Digitale Spaltung per Gesetz |
- | *Distributed FPGA Number Crunching For The Masses | + | * 29. - Distributed FPGA Number Crunching For The Masses |
- | *DIY synthesizers and sound generators | + | * 30. - DIY synthesizers and sound generators |
- | *Eins, zwei, drei - alle sind dabei | + | * 31. - Eins, zwei, drei - alle sind dabei |
- | *File -& | + | * 32. - File -> Print -> Electronics |
- | *Fnord-Jahresr&# | + | * 33. - Fnord-Jahresrückblick |
- | *Friede sei mit Euren Daten | + | * 34. - Friede sei mit Euren Daten |
- | *From robot to robot | + | * 35. - From robot to robot |
- | *FrozenCache | + | * 36. - Frozen Cache |
- | *Hacker Jeopardy | + | * 37. - Hacker Jeopardy |
- | *Hackers and Computer Science | + | * 38. - Hackers and Computer Science |
- | *Hacking iButtons | + | * 39. - Hacking iButtons |
- | *hacking smart phones | + | * 40. - hacking smart phones |
- | *Having fun with RTP | + | * 41. - Having fun with RTP |
- | *High-speed high-security cryptography: | + | * 42. - High-speed high-security cryptography: |
- | *How the Internet sees you | + | * 43. - How the Internet sees you |
- | *Ich sehe nicht, dass wir nicht zustimmen werden | + | * 44. - Ich sehe nicht, dass wir nicht zustimmen werden |
- | *I Control Your Code | + | * 45. - I Control Your Code |
- | *Ignorance and Peace Narratives in Cyberspace | + | * 46. - Ignorance and Peace Narratives in Cyberspace |
- | *IMMI, from concept to reality | + | * 47. - IMMI, from concept to reality |
- | *INDECT - an EU-Surveillance Project | + | * 48. - INDECT - an EU-Surveillance Project |
- | *International Cyber Jurisdiction | + | * 49. - International Cyber Jurisdiction |
- | *Is the SSLiverse a safe place? | + | * 50. - Is the SSLiverse a safe place? |
- | *JTAG/ | + | * 51. - JTAG/ |
- | *Lightning Talks - Day 2 | + | * 52. - Lightning Talks - Day 2 |
- | *Lightning Talks - Day 3 | + | * 53. - Lightning Talks - Day 3 |
- | *Lightning Talks - Day 4 | + | * 54. - Lightning Talks - Day 4 |
- | *Literarischer Abend | + | * 55. - Literarischer Abend |
- | *Logikschaltungen ohne Elektronik | + | * 56. - Logikschaltungen ohne Elektronik |
- | *Lying To The Neighbours | + | * 57. - Lying To The Neighbours |
- | *Netzmedienrecht, | + | * 58. - Netzmedienrecht, |
- | *Netzneutralit&# | + | * 59. - Netzneutralität |
- | *News Key Recovery Attacks on RC4/WEP | + | * 60. - News Key Recovery Attacks on RC4/WEP |
- | *Node.js as a networking tool | + | * 61. - Node.js as a networking tool |
- | *OMG WTF PDF | + | * 62. - OMG WTF PDF |
- | *Part-Time Scientists | + | * 63. - Part-Time Scientists |
- | *Pentanews Game Show | + | * 64. - Pentanews Game Show |
- | *Radio der Zukunft | + | * 65. - Radio der Zukunft |
- | *Recent advances in IPv6 insecurities | + | * 66. - Recent advances in IPv6 insecurities |
- | *Reverse Engineering a real-world RFID payment system | + | * 67. - Reverse Engineering a real-world RFID payment system |
- | *Reverse Engineering the MOS 6502 CPU | + | * 68. - Reverse Engineering the MOS 6502 CPU |
- | *Rootkits and Trojans on Your SAP Landscape | + | * 69. - Rootkits and Trojans on Your SAP Landscape |
- | *Running your own GSM stack on a phone | + | * 70. - Running your own GSM stack on a phone |
- | *Safety on the Open Sea | + | * 71. - Safety on the Open Sea |
- | *Secure communications below the hearing threshold | + | * 72. - Secure communications below the hearing threshold |
- | *Security Nightmares | + | * 73. - Security Nightmares |
- | *SIP home gateways under fire | + | * 74. - SIP home gateways under fire |
- | *SMS-o-Death | + | * 75. - SMS-o-Death |
- | *Spinning the electronic Wheel | + | * 76. - Spinning the electronic Wheel |
- | *" | + | * 77. - " |
- | *Stanislaw Lem - Der entt&# | + | * 78. - Stanislaw Lem - Der enttäuschte |
- | *Techniken zur Identifizierung von Netzwerk-Protokollen | + | * 79. - Techniken zur Identifizierung von Netzwerk-Protokollen |
- | *Terrorists Win - Exploiting Telecommunications Data Retention? | + | * 80. - Terrorists Win - Exploiting Telecommunications Data Retention? |
- | *The Baseband Apocalypse | + | * 81. - The Baseband Apocalypse |
- | *"The Concert" | + | * 82. - "The Concert" |
- | *The Hidden Nemesis | + | * 83. - The Hidden Nemesis |
- | *The importance of resisting Excessive Government Surveillance | + | * 84. - The importance of resisting Excessive Government Surveillance |
- | *Three jobs that journalists will do in 2050 | + | * 85. - Three jobs that journalists will do in 2050 |
- | *Tor is Peace, Software Freedom is Slavery, Wikipedia is Truth | + | * 86. - Tor is Peace, Software Freedom is Slavery, Wikipedia is Truth |
- | *USB and libusb | + | * 87. - USB and libusb |
- | *Von Zensursula | + | * 88. - Von Zensursula |
- | *Whistleblowing | + | * 89. - Whistleblowing |
- | *Wideband GSM Sniffing | + | * 90. - Wideband GSM Sniffing |
- | *Wikileaks und mehr | + | * 91. - Wikileaks und mehr |
- | *Your Infrastructure Will Kill You | + | * 92. - Your Infrastructure Will Kill You |
- | *Zero-sized heap allocations vulnerability analysis | + | * 93. - Zero-sized heap allocations vulnerability analysis |
+ | |||
+ | ====== Voting ====== | ||
+ | * paalsteek: 1, 2, 8, 10, 11, 14, 22, 26, 31, 32, 33, 62, 66, 70, 71, 73, 76 | ||
+ | * `: 4, 12, 14, 22, 23, 25, 27, 33, 36, 37, 42, 43, 44, 45, 50, 57, 60, 61, 62, 66, 73, 79, 83, 93 | ||
+ | * q-rai: 1, 2, 3, 8, 14, 15, 17, 18, 19, 21, 27, 31, 33, 35, 37, 41, 43, 59, 62, 63, 64, 65, 76, 78, 87 |